/external/selinux/policycoreutils/gui/ |
loginsPage.py | 1 ## loginsPage.py - show selinux mappings 58 col = gtk.TreeViewColumn(_("SELinux\nUser"), gtk.CellRendererText(), text=1)
|
polgengui.py | 3 # polgengui.py - GUI for SELinux Config tool in system-config-selinux 74 gnome.program_init("SELinux Policy Generation Tool", "5") 78 sys.path.append('/usr/share/system-config-selinux') 93 xml = gtk.glade.XML("/usr/share/system-config-selinux/polgen.glade", domain=PROGNAME) [all...] |
portsPage.py | 1 ## portsPage.py - show selinux mappings 87 col = gtk.TreeViewColumn(_("SELinux Port\nType"), gtk.CellRendererText(), text=TYPE_COL)
|
system-config-selinux.glade | 11 <property name="name" translatable="yes">system-config-selinux</property> 18 <property name="logo">system-config-selinux.png</property> 22 <property name="title" translatable="yes">Add SELinux Login Mapping</property> 128 <property name="label" translatable="yes">SELinux User</property> 257 <property name="title" translatable="yes">Add SELinux Network Ports</property> 391 <property name="label" translatable="yes">SELinux Type</property> 544 <property name="title" translatable="yes">Add SELinux Login Mapping</property> 678 <property name="label" translatable="yes">SELinux Type</property> 837 <property name="title" translatable="yes">Add SELinux User</property> [all...] |
/external/selinux/policycoreutils/semanage/ |
semanage-bash-completion.sh | 28 dir -1 -F /etc/selinux/ | grep '/' | cut -d'/' -f 1 55 dir -1 -F /etc/selinux/ | grep '/' | cut -d'/' -f 1
|
/external/selinux/prebuilts/bin/ |
sesearch.py | 27 description="SELinux policy rule search tool.", 30 parser.add_argument("policy", help="Path to the SELinux policy to search.", nargs="?")
|
/system/core/adb/daemon/ |
main.cpp | 36 #include "selinux/android.h" 148 LOG(FATAL) << "Could not set SELinux context";
|
/system/core/run-as/ |
run-as.c | 37 #include <selinux/android.h> 195 panic("Could not set SELinux security context: %s\n", strerror(errno));
|
/external/dbus/cmake/ |
CMakeLists.txt | 277 #AC_ARG_ENABLE(selinux, AS_HELP_STRING([--enable-selinux],[build with SELinux support]),enable_selinux=$enableval,enable_selinux=auto) 278 #selinux missing 556 #message(" Building SELinux support: ${have_selinux} ")
|
/system/sepolicy/ |
domain.te | 125 # toybox loads libselinux which stats /sys/fs/selinux/ 189 # No domain needs mac_override as it is unused by SELinux. 195 # Only init should be able to load SELinux policies. 201 # Only init and the system_server can set selinux.reload_policy 1 252 # triggered, it's probably due to a service with no SELinux domain.
|
init.te | 133 # Reload policy upon setprop selinux.reload_policy 1. 220 # Perform SELinux access checks on setting properties.
|
/external/selinux/policycoreutils/audit2allow/ |
audit2allow | 33 import selinux.audit2why as audit2why namespace 92 help="Translates SELinux audit messages into a description of why the access was denied") 242 import selinux namespace
|
audit2why | 33 import selinux.audit2why as audit2why namespace 92 help="Translates SELinux audit messages into a description of why the access was denied") 242 import selinux namespace
|
/frameworks/base/core/java/com/android/internal/content/ |
NativeLibraryHelper.java | 35 import android.os.SELinux; 278 } else if (!SELinux.restorecon(path)) { 279 throw new IOException("Cannot set SELinux context for " + path.getPath());
|
/system/core/adb/ |
file_sync_service.cpp | 25 #include <selinux/android.h> 75 // Not all filesystems support setting SELinux labels. http://b/23530370. 176 // Not all filesystems support setting SELinux labels. http://b/23530370.
|
/cts/tests/tests/permission/src/android/permission/cts/ |
FileSystemPermissionTest.java | 716 new File("/sys/fs/selinux/member"), 717 new File("/sys/fs/selinux/user"), 718 new File("/sys/fs/selinux/relabel"), 719 new File("/sys/fs/selinux/create"), 720 new File("/sys/fs/selinux/access"), 721 new File("/sys/fs/selinux/context") [all...] |
/external/dbus/bus/ |
bus.c | 36 #include "selinux.h" 655 * inotify, connections to SELinux, etc. 917 bus_context_log (context, DBUS_SYSTEM_LOG_FATAL, "SELinux enabled but AVC initialization failed; check system log\n"); [all...] |
/docs/source.android.com/src/security/authentication/ |
fingerprint-hal.jd | 128 an SELinux policy. That is, the Serial Peripheral Interface (SPI) channel must 129 be accessible only to the TEE, and there must be an explicit SELinux policy on
|
/external/libselinux/utils/ |
sefcontext_compile.c | 12 #include <selinux/selinux.h>
|
/external/selinux/libselinux/src/ |
label.c | 14 #include <selinux/selinux.h>
|
/external/selinux/libselinux/utils/ |
sefcontext_compile.c | 12 #include <selinux/selinux.h>
|
/external/selinux/secilc/docs/ |
cil_file_labeling_statements.md | 107 Label filesystems that support SELinux security contexts. 131 <li><p><code>xattr</code> - Filesystems supporting the extended attribute <code>security.selinux</code>. The labeling is persistent for filesystems that support extended attributes.</p></li>
|
/cts/tests/tests/security/src/android/security/cts/ |
HwRngTest.java | 116 // This can occur because SELinux blocked stat access on the device nodes.
|
/developers/build/templates/create/ |
template-params.xml.ftl | 74 be used sparingly. (e.g. VPN clients, SELinux, custom instrumentation runners) -->
|
/developers/samples/android/wearable/wear/SpeedTracker/ |
template-params.xml | 81 be used sparingly. (e.g. VPN clients, SELinux, custom instrumentation runners) -->
|